aboutsummaryrefslogtreecommitdiff
path: root/net/sshtunnel/files/uci_sshtunnel
blob: 496e4703092a49660052339a8ed322da81662a10 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
# Password auth is not possible so only Public Key auth must be used.
# Set "option IdentityFile" to the file from which the identity (private key) is read.
# By default the OpenSSH client checks for /root/.ssh/id_rsa, /root/.ssh/id_ed25519 and /root/.ssh/id_ecdsa
# See https://openwrt.org/docs/guide-user/services/ssh/sshtunnel

#config server example
#	option user			root
#	option hostname			server.example.com
#	option port			22
#	option retrydelay		1
#	option CheckHostIP		yes
#	option Compression		no
#	option CompressionLevel		6
#	option IdentityFile		/root/.ssh/id_rsa
#	option LogLevel			INFO
#	option PKCS11Provider		/lib/pteidpkcs11.so
#	option ServerAliveCountMax	3
#	option ServerAliveInterval	0
#	option StrictHostKeyChecking	accept-new
#	option TCPKeepAlive		yes
#	option VerifyHostKeyDNS		yes

# tunnelR(emote) - when the connection will be initiated to the R(emote) endpoint at
# remoteaddress:remoteport and then forwarded to localaddress:localport
#
#config tunnelR http
#	option server		example
#	option remoteaddress	*
#	option remoteport	9009
#	option localaddress	192.168.1.13
#	option localport	80

# tunnelL(ocal) - when the connection will be initiated to the L(ocal) endpoint at
# localaddress:localport and then forwarded to remoteaddress:remoteport
#
#config tunnelL test
#	option server		example
#	option localaddress	*
#	option localport	1022
#	option remoteaddress	secretserver.example.com
#	option remoteport	22

# tunnelD(ynamic) - when the connection will be initiated with the SOCKS4 or SOCKS5 protocol
# to the local endpoint at localaddress:localport and then forwarded over the remote host
#
#config tunnelD proxy
#	option server		example
#	option localaddress	*
#	option localport	4055

# tunnelW - creates TUN/TAP devices on client and server to establish a VPN tunnel between them
# vpntypes:
#  point-to-point = TUN
#  ethernet = TAP
#
#config tunnelW proxy
#	option server           example
#	option vpntype		point-to-point|ethernet
#	option localdev		any|0|1|2|...
#	option remotedev	any|0|1|2|...